CVE-2026-1229

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to exploit a flaw in the CombinedMult function of Cloudflare's CIRCL library, potentially leading to incorrect calculations with certain inputs. However, it primarily affects specific mathematical operations and does not impact key exchange or signing processes, making it less critical for most users.

Technical Description

The CombinedMult function in the CIRCL ecc/p384 package (secp384r1 curve) produces an incorrect value for specific inputs. The issue is fixed by using complete addition formulas. ECDH and ECDSA signing relying on this curve are not affected. The bug was fixed in v1.6.3 https://github.com/cloudflare/circl/releases/tag/v1.6.3 .

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged

Vector String

CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:X/V:X/RE:X/U:Amber

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$395($100-$500)
Vendor Response
Grade APatched in 6 days

Quick Information

Published

Feb 24, 2026

about 1 month ago

Last Modified

Mar 3, 2026

about 1 month ago

Vendor

cloudflare

Product

circl